必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.121.39.155
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34162
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.121.39.155.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 05:46:36 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
b'Host 155.39.121.136.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 155.39.121.136.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
177.34.4.87 attackspambots
Automatic report - Port Scan Attack
2019-11-11 05:32:01
54.37.204.154 attackbots
2019-11-10T17:29:14.700624shield sshd\[25662\]: Invalid user testen from 54.37.204.154 port 60530
2019-11-10T17:29:14.705252shield sshd\[25662\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.ip-54-37-204.eu
2019-11-10T17:29:15.983756shield sshd\[25662\]: Failed password for invalid user testen from 54.37.204.154 port 60530 ssh2
2019-11-10T17:32:55.183512shield sshd\[25868\]: Invalid user sambaman from 54.37.204.154 port 41408
2019-11-10T17:32:55.188016shield sshd\[25868\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.ip-54-37-204.eu
2019-11-11 05:07:25
177.8.244.38 attackbotsspam
Nov 10 16:43:04 Ubuntu-1404-trusty-64-minimal sshd\[3405\]: Invalid user schleisner from 177.8.244.38
Nov 10 16:43:04 Ubuntu-1404-trusty-64-minimal sshd\[3405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.8.244.38
Nov 10 16:43:06 Ubuntu-1404-trusty-64-minimal sshd\[3405\]: Failed password for invalid user schleisner from 177.8.244.38 port 57962 ssh2
Nov 10 17:04:00 Ubuntu-1404-trusty-64-minimal sshd\[23207\]: Invalid user rpc from 177.8.244.38
Nov 10 17:04:00 Ubuntu-1404-trusty-64-minimal sshd\[23207\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.8.244.38
2019-11-11 05:35:44
140.143.199.89 attackbots
2019-11-10T16:04:05.789628abusebot-6.cloudsearch.cf sshd\[13764\]: Invalid user 123Sunset from 140.143.199.89 port 46442
2019-11-11 05:33:19
81.22.45.190 attackspam
2019-11-10T21:59:08.896098+01:00 lumpi kernel: [3241927.815944] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.190 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=40946 PROTO=TCP SPT=50026 DPT=55822 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-11 05:38:21
1.159.173.139 attackspam
TCP Port Scanning
2019-11-11 05:39:08
84.220.124.105 attackbots
MYH,DEF GET /wp-login.php
2019-11-11 05:42:30
89.247.152.129 attackspambots
Honeypot attack, port: 23, PTR: i59F79881.versanet.de.
2019-11-11 05:32:51
115.79.212.106 attack
Brute force attempt
2019-11-11 05:15:32
106.13.182.126 attackspam
Nov 10 20:13:50 localhost sshd\[1706\]: Invalid user durie from 106.13.182.126 port 32984
Nov 10 20:13:50 localhost sshd\[1706\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.182.126
Nov 10 20:13:52 localhost sshd\[1706\]: Failed password for invalid user durie from 106.13.182.126 port 32984 ssh2
2019-11-11 05:06:56
104.206.128.66 attack
" "
2019-11-11 05:36:04
49.88.112.113 attack
Failed password for root from 49.88.112.113 port 34773 ssh2
Failed password for root from 49.88.112.113 port 34773 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113  user=root
Failed password for root from 49.88.112.113 port 28214 ssh2
Failed password for root from 49.88.112.113 port 28214 ssh2
2019-11-11 05:35:13
159.203.122.31 attack
SSHScan
2019-11-11 05:37:04
46.39.53.45 attackspam
Chat Spam
2019-11-11 05:20:32
51.254.23.240 attackbots
Nov 10 20:22:52 REDACTED sshd\[8615\]: Invalid user dev from 51.254.23.240
Nov 10 20:25:27 REDACTED sshd\[8639\]: Invalid user dev from 51.254.23.240
Nov 10 20:28:08 REDACTED sshd\[8675\]: Invalid user dev from 51.254.23.240
Nov 10 20:30:59 REDACTED sshd\[8699\]: Invalid user dev from 51.254.23.240
Nov 10 20:33:50 REDACTED sshd\[8723\]: Invalid user dev from 51.254.23.240
...
2019-11-11 05:40:09

最近上报的IP列表

195.36.252.106 33.18.232.236 148.146.231.235 84.1.198.222
74.37.249.148 46.193.252.156 115.171.220.106 57.254.142.67
127.124.51.189 120.202.208.88 154.159.40.152 101.225.251.55
53.39.159.242 204.19.216.147 157.71.214.73 160.238.98.98
80.43.205.118 92.111.124.165 67.13.86.77 168.137.101.30